Skip to the content.

Logo

These devices have almost the same categories as the wearables, so the results are similar:

(Back Testing)

Logo

Therefore, three techniques should be considered: “Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol”, “System Network Configuration Discovery” and “Data from cloud storage object”. These techniques have worse detection coverage while being commonly used by the selected cyber-criminal groups.

(Back Testing)